Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 5.8

    MEDIUM
    CVE-2009-1580

    Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie.... Read more

    Affected Products : squirrelmail
    • Published: May. 14, 2009
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2009-0483

    Cross-site request forgery (CSRF) vulnerability in Bugzilla 2.22 before 2.22.7, 3.0 before 3.0.7, 3.2 before 3.2.1, and 3.3 before 3.3.2 allows remote attackers to delete keywords and user preferences via a link or IMG tag to (1) editkeywords.cgi or (2) u... Read more

    Affected Products : bugzilla
    • Published: Feb. 09, 2009
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2008-7159

    The silc_asn1_encoder function in lib/silcasn1/silcasn1_encode.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.8 allows remote attackers to overwrite a stack location and possibly execute arbitrary code via a crafted OID value, related to... Read more

    Affected Products : silc_toolkit
    • Published: Sep. 10, 2009
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2019-16780

    WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of this att... Read more

    Affected Products : debian_linux wordpress
    • Published: Dec. 26, 2019
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2007-4965

    Multiple integer overflows in the imageop module in Python 2.5.1 and earlier allow context-dependent attackers to cause a denial of service (application crash) and possibly obtain sensitive information (memory contents) via crafted arguments to (1) the to... Read more

    Affected Products : python
    • Published: Sep. 18, 2007
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2007-3947

    request.c in lighttpd 1.4.15 allows remote attackers to cause a denial of service (daemon crash) by sending an HTTP request with duplicate headers, as demonstrated by a request containing two Location header lines, which results in a segmentation fault.... Read more

    Affected Products : lighttpd
    • Published: Jul. 24, 2007
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2007-2925

    The default access control lists (ACL) in ISC BIND 9.4.0, 9.4.1, and 9.5.0a1 through 9.5.0a5 do not set the allow-recursion and allow-query-cache ACLs, which allows remote attackers to make recursive queries and query the cache.... Read more

    Affected Products : bind
    • Published: Jul. 24, 2007
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2007-6473

    Heap-based buffer overflow in Texas Imperial Software WFTPD Pro Explorer 1.0 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command.... Read more

    Affected Products : wftpd_pro_explorer
    • Published: Dec. 20, 2007
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2007-6333

    The HPInfoDLL.HPInfo.1 ActiveX control in HPInfoDLL.dll 1.0, as shipped with HP Info Center (hpinfocenter.exe) 1.0.1.1 in HP Quick Launch Button (QLBCTRL.exe, aka QLB) 6.3 and earlier, allows remote attackers to read arbitrary registry values via the argu... Read more

    Affected Products : info_center quick_launch_button
    • Published: Dec. 13, 2007
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2007-4099

    Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks.... Read more

    Affected Products : tor tor
    • Published: Jul. 30, 2007
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2024-27402

    In the Linux kernel, the following vulnerability has been resolved: phonet/pep: fix racy skb_queue_empty() use The receive queues are protected by their respective spin-lock, not the socket lock. This could lead to skb_peek() unexpectedly returning NULL... Read more

    Affected Products : linux_kernel
    • Published: May. 17, 2024
    • Modified: Sep. 18, 2025
  • 5.8

    MEDIUM
    CVE-2018-6110

    Parsing documents as HTML in Downloads in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to cause Chrome to execute scripts via a local non-HTML page.... Read more

    • Published: Jan. 09, 2019
    • Modified: Nov. 21, 2024
  • 5.8

    MEDIUM
    CVE-2014-9750

    ntp_crypto.c in ntpd in NTP 4.x before 4.2.8p1, when Autokey Authentication is enabled, allows remote attackers to obtain sensitive information from process memory or cause a denial of service (daemon crash) via a packet containing an extension field with... Read more

    • Published: Oct. 06, 2015
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2014-3596

    The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof... Read more

    Affected Products : axis
    • Published: Aug. 27, 2014
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2014-2532

    sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character.... Read more

    • Published: Mar. 18, 2014
    • Modified: Apr. 12, 2025
  • 5.8

    MEDIUM
    CVE-2013-3813

    Unspecified vulnerability in Oracle Solaris 10 allows remote attackers to affect confidentiality and integrity via vectors related to Libraries/PAM-Unix.... Read more

    Affected Products : sunos solaris
    • Published: Jul. 17, 2013
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2010-4651

    Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679... Read more

    Affected Products : gnu_patch
    • Published: Mar. 11, 2011
    • Modified: Apr. 11, 2025
  • 5.8

    MEDIUM
    CVE-2017-2144

    Cybozu Garoon 3.0.0 to 4.2.4 may allow an attacker to lock another user's file through a specially crafted page.... Read more

    Affected Products : garoon
    • Published: Jul. 07, 2017
    • Modified: Apr. 20, 2025
  • 5.8

    MEDIUM
    CVE-2009-1888

    The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors re... Read more

    Affected Products : ubuntu_linux debian_linux samba
    • Published: Jun. 25, 2009
    • Modified: Apr. 09, 2025
  • 5.8

    MEDIUM
    CVE-2007-5355

    The Web Proxy Auto-Discovery (WPAD) feature in Microsoft Internet Explorer 6 and 7, when a primary DNS suffix with three or more components is configured, resolves an unqualified wpad hostname in a second-level domain outside this configured DNS domain, w... Read more

    • Published: Dec. 05, 2007
    • Modified: Apr. 09, 2025
Showing 20 of 294842 Results